Agenda

Agenda

Wednesday | November 14

Classified

At CyberSat 2018 classified day, DoD, Intelligence Community, and industry leaders will discuss advancements and challenges in assuring space system missions throughout the ever-increasingly cyber-contested lifecycle.

Attendees will be updated on the space cyber landscape through presentations from senior intel analysts, hands-on space system hackers, and those developing and deploying technologies to enhance architectural resiliency against emerging cyber threats.

In order to attend the CyberSat Summit Classified Day at MITRE on November 14, you must provide your proof of clearance to MITREno later than October 31, 2018. Please click here for directions.As a reminder, the morning session (8 a.m. – Noon) is a SCI session and will be held at a TOP SECRET//SI/TK//NOFORN level and the afternoon (1:30 p.m. – 5:30 p.m.) is a collateral session and will be held at a SECRET//NOFORN level.

*EC-Council’s CCISO Hybrid Training CourseA unique opportunity to receive condensed course and exam preparation for Certified Chief Information Security Officer (CCISO). This hybrid program allows for less time away from the office and will combine video lectures, live instructor-led Exam Prep, Q&A, and certification testing to be completed on Wednesday, November 14th. A free pass to CyberSat Summit is included with registration.8:00 am – 5:00 pm Certification Testing

For complete details or to register, please contact your Training Concierge; jessica.johnson@eccouncil.org or (505) 922-2894 and Jessica will help you get set up with a seat in the workshop as well as a ticket to the 2018 CyberSat Summit!

Thursday | November 15

8:00 AM – 9:00 AM

Breakfast

9:00 AM – 9:30 AM

A Fireside Chat with Dave DeWalt and Bob Gourley

To kick off CyberSat 2018, Bob Gourley, CTO, Crucial Point LLC will host a fireside chat with one of the most prominent influencers in the world of Cybersecurity, Dave DeWalt. DeWalt is a 30 year veteran in the cybersecurity arena, and has previously been the CEO of companies like Fireeye and McAfee and has even spoken at the World Economic Forum. He is the very definition of an ‘influencer’ within Cybersecurity. In this fireside chat, he will use that experience to talk about how the satellite industry can counter the cyber threat and the unique threats this industry faces to keep their assets on the ground, and in space secure.

Bob Gourley is founder and CTO of the cybersecurity consultancy Crucial Point and the publisher of CTOvision.com and ThreatBrief.com. Bob’s most recent book, The Cyber Threat, provides business executives with actionable insights into the threat landscape. Bob’s first career was as a naval intelligence officer, which included operational tours in Europe and Asia. Bob was the first Director of Intelligence (J2) at DoD’s cyber defense organization JTF-CND. Following retirement from the Navy, Bob was an executive with TRW and Northrop Grumman, and then returned to government service as the CTO of the Defense Intelligence Agency (DIA). Bob was named one of the top 25 most influential CTOs in the globe by Infoworld. He was selected for AFCEAs award for meritorious service to the intelligence community, and was named by Washingtonian as one of DC’s “Tech Titans.” Bob is known throughout the aviation community for his fact-based, no-hype assessments on the cyber threat.

Dave DeWalt

Founder & Chairman

Momentum Cyber

Dave DeWalt has spent over 30 years in the Technology industry holding a series of leadership positions in some of the industry’s most innovative and successful companies.
Dave is a Founder & Chairman at Momentum Cyber a firm he co-founded in 2018 along with Michael Tedesco and Eric McAlpine. Momentum Cyber is the premier trusted strategic advisor to the Cybersecurity industry providing bespoke high-impact advice combined with tailored senior-level access from incubation to exit. Dave also serves as Founder and Partner at NightDragon Security, as well as Managing Director at Allegis Cyber where he conducts his early and growth stage investing activities.
Dave has been a successful CEO for 17 years, with his most recent stint as FireEye’s Chief Executive Officer from November 2012 to June 2016 and Chairman of the Board from June 2012 to January 2017. Dave was President and Chief Executive Officer of McAfee, from 2007 until 2011 when McAfee was acquired by Intel Corporation. From 2003 to 2007, he held executive positions with EMC Corporation, a provider of information infrastructure technology and solutions, including serving as Executive Vice President and President-Customer Operations and Content Management Software. In 2003, as President / Chief Executive Officer, he led Documentum through nine consecutive quarters of growth, five record revenue quarters and four successful acquisitions before leading its sale to EMC for $1.9B.
Dave’s current investments and board roles include Optiv, ForeScout, ForgeRock, Claroty, Callsign, Illusive Networks, Social Safeguard, the two leading cyber incubators in Team8 and DataTribe, and Delta Airlines.
Dave also held various executive positions at Quest Software, Segue and Oracle Corporation. Over the course of his career he has helped build companies from startup (Eventus, Quest) to midsize (Documentum, Segue) to some of the largest (Oracle, EMC). A true expert in acquisitions, he led the sale of McAfee, Documentum, and Eventus, has been acquired three times, and has acquired more than 50 companies over the course of his career.
Dave has substantial expertise in the information technology security industry and his strategic and operational experience. Dave was named one of the 25 most influential executives in high technology by the readers of the industry publication CRN. He has spoken at the World Economic Forum on the issue of cyber security and keynoted at several technology industry conferences including Interop and Software 2008 and RSA.
Dave holds a B.S. degree in Computer Science from the University of Delaware.

9:30 AM – 10:30 AM

The Cyber Threat 2019: The Threat Landscape and How it is Evolving

Cyber threats to satellites are real and they exist. In this panel to kick-off CyberSat 2018, we examine the latest in terms of threats, what we have seen in 2018, what could happen in 2019, and how this will impact the satellite sector and end-users of the technology going forward. This panel will examining where the threats are coming from, how satellite companies could be targeted and how they can prepare for an increasingly complex cyber future.

Bob Gourley is founder and CTO of the cybersecurity consultancy Crucial Point and the publisher of CTOvision.com and ThreatBrief.com. Bob’s most recent book, The Cyber Threat, provides business executives with actionable insights into the threat landscape. Bob’s first career was as a naval intelligence officer, which included operational tours in Europe and Asia. Bob was the first Director of Intelligence (J2) at DoD’s cyber defense organization JTF-CND. Following retirement from the Navy, Bob was an executive with TRW and Northrop Grumman, and then returned to government service as the CTO of the Defense Intelligence Agency (DIA). Bob was named one of the top 25 most influential CTOs in the globe by Infoworld. He was selected for AFCEAs award for meritorious service to the intelligence community, and was named by Washingtonian as one of DC’s “Tech Titans.” Bob is known throughout the aviation community for his fact-based, no-hype assessments on the cyber threat.

Bobbie Stempfley

Managing Director, CERT Division

Software Engineering Institute, Carnegie Mellon University

In Bobbie Stempfley’s 20-plus years of public service, she has focused on strategy and driving transformation in government-focused organizations. Previously, at the U.S. Department of Homeland Security, she led efforts to increase the public sector's security and resilience against cyber threats and to raise awareness, reduce risks, and prepare and respond to cyber events. She served as chief information officer (CIO) of the Defense Information Systems Agency, where her work spanned the internal technology used in the agency and the capabilities put in the hands of war fighters and their mission support organizations. Stempfley is currently the director of the Software Engineering Institute’s CERT Division, and was previously the Director of cyber strategy implementation at MITRE Corp.

Joshua Ray

Managing Director, Global Cyber Defense Lead & iDefense GM

Accenture Security

Josh is the Global Cyber Defense Practice Lead and iDefense General Manager for Accenture Security. He has over 18 years of combined commercial, government and military experience in the field of cyber intelligence, threat operations and information security. Prior to Accenture’s acquisition of iDefense, Josh was responsible for Verisign’s enterprise Cyber Intelligence Program as well as the operations and product strategy for the iDefense business. During his work with Raytheon, Josh created and managed the Cyber Threat Operations Intelligence Program, which handled enterprise-wide intelligence activities focusing on defining and providing early warning of advanced cyber threats targeting Raytheon’s networks. Josh also held technical leadership roles with the Office of Naval Intelligence (ONI) and the Northrop Grumman Corporation at the Joint Task Force – Global Network Operations (JTF-GNO), providing intelligence support to focused operations. He holds a Bachelor of Science in information technology from George Mason University, an Executive Certificate in strategy and innovation from MIT Sloan School of Management and served honorably as a member of the US Navy.

Matthew Devost

EVP, Strategy & Operations

Tulco Holdings

Matthew Devost is a widely known, highly respected technologist, entrepreneur, and international security expert specializing in cybersecurity, counterterrorism, critical infrastructure protection, intelligence, and risk management issues. Mr. Devost is currently the EVP for Strategy and Operations at Tulco Holdings. Previously, Mr. Devost was a Managing Director at Accenture where he led the Global Cyber Defense practice responsible for Accenture’s cloud, mobile, infrastructure, network, endpoint, incident response, threat intelligence, threat hunting, vulnerability management, IOT/IIOT, and red teaming offerings. Mr. Devost joined Accenture following their 2015 acquisition of the global cybersecurity consultancy FusionX LLC where he had served as President & CEO since 2010. As a Founder of FusionX, Mr. Devost helped an international clientele identify and manage dynamic threats in complex operational environments.

10:30 AM – 11:00 AM

Coffee Break

11:00 AM – 12:00 PM

Next Generation Satellite Cybersecurity: Software Defined Satellites, SmallSats and How Cyber Plays Into This

Representatives of cybersecurity organizations will talk about new systems or services to address cybersecurity issues associated with small-sats, software defined satellites, hosted payloads and other aspects of the emerging environment. With satellites becoming more flexible, more technical and more creative in terms of their coverage, we look at how these satellites could be targeted and how operators of these satellites need to invest to keep them secure.

12:00 PM – 1:00 PM

Lunch and a Live Hack!

In this innovative presentation, Munro plans to carry out some live hacking demonstrations against satellite terminal equipment, showing how poor security practice can expose the users systems to compromise. Munro will also look briefly at the security of satellites themselves. With very similar security issues found in smart consumer electronic devices, Munro will also demo some entertaining, surprising hacks of everyday devices in your home too. He may even show how Amazon Echo and your smart TV can be used to hijack your house.

Ken is Partner and Founder of Pen Test Partners, a firm of ethical hackers. He regularly blogs on everything from satellite communication hacking to maritime security and the Internet of Things. This has led to regular appearances on BBC TV and BBC News online as well as the broadsheet press. He also writes for various newspapers and industry magazines in an effort to get beyond the unhelpful scaremongering put about by many security vendors. Ken has become a voice for reform and legislative change in the largely unregulated IoT, briefing UK and US government departments as well as being involved with various EU consumer councils. He has also spoken about satellite communication security at various maritime events such as Digital Ship Rotterdam/Oslo/Limassol and CMA Shipping.

1:00 PM – 1:30 PM

Dessert Break with Exhibitors

1:30 PM – 2:15 PM

Satellite Eco-System: Guarding the Perimeter

Satellite networks are becoming even more complex. However, with assets on the ground and assets in the sky, there are multiple entry points for hackers to get into these systems. In a recent interview with Via Satellite, KPN CISO Jaya Baloo spoke about the vulnerabilities at the ground station and how this could be a weakness in the networks. Similarly, networks with COTS equipment could also be vulnerable. Here, we talk to satellite companies about their plans in investing in equipment, and keeping all assets secure.

Vinit Duggal is currently Director and CISO for Intelsat. Since joining Intelsat in 2002, he is responsible for the development of an information security framework that fits the business needs for both the corporate and service provider entities that make up
Intelsat’s overall operations.
Prior to joining Intelsat, Mr. Duggal was the Chief Security Architect with Nortel Networks Professional Services. At Nortel he developed the reference architecture and consulting models that the practice was built on, as well as led many of the key consulting engagements. Before joining
Nortel he held the position of Associate Director of Information Security Consulting at VISTAIT where he helped build the security consulting practice from the ground up. His primary responsibilities were to setup foundations of the consulting practice, as well as oversee the consulting staff. He developed security models for various types of organizations that allowed them to create individualized security infrastructure and policy. Mr. Duggal started his career in information security working for the Aviation Civil Intelligence division of the FAA (Now part of TSA).
Outside of his daily duties as CISO at Intelsat, Mr. Duggal takes part in many Information and Network Security activities. He has worked with and spoke at many events for SANS, CSI, Applied Network Security Foundation, Information Security Magazine, and Department of Homeland Security, to name a few. He is an active member of ISC2, where he is helping create the standards to help the current and future information security professional.
Intelsat S.A. (NYSE: I) operates the world’s first Globalized Network, delivering high-quality, cost-effective video and broadband services anywhere in the world. Intelsat’s Globalized Network combines the world’s largest satellite backbone with terrestrial infrastructure, managed services and an open, interoperable architecture to enable customers to drive revenue and reach through a new generation of network services. Thousands of organizations serving billions of people worldwide rely on Intelsat to provide ubiquitous broadband connectivity, multi-format video broadcasting, secure satellite communications and seamless mobility services. The end result is an entirely new world, one that allows us to envision the impossible, connect without boundaries and transform the ways in which we live. For more information, visit www.intelsat.com.

2:15 PM – 3:00 PM

Women in Cyber and Satellite: Influencers Talk about Changing Cyber World

The satellite world has been a male dominated world for many years but things are changing. For the satellite industry to maximize its potential, it needs more young people and more women to be a part of the eco-system. Cybersecurity is a new perimeter and new border, and in this unique panel we gather together some of the most powerful female voices working in the satellite industry and cyber and see how they view the cyber threat, and what can be done in a male dominated industry to bring brilliant female minds to the frontline of the cyber battle.

3:00 PM – 3:30 PM

Coffee Break

3:30 PM – 4:30 PM

Panel on the Defensive within the Government, Intelligence and Military Arena

The government is one of the biggest buyers of satellite capacity out there. However, governments and related infrastructure are some of the biggest targets for cyber-crime. An attack that cripples key infrastructure could have huge ramifications for all involved. Here, we look at potential vulnerabilities and what the satellite industry is doing to make sure its key customers here remain cyber secure. We look at the complex relationship between the government and the satellite industry and the dynamics within the defense market are changing.

Joshua Hartman, Managing Partner, was formerly the Chief Executive Officer of Horizon Strategies Group (HSG), before HSG joined Renaissance. He currently sits on several corporate boards, is featured frequently in defense related publications, is regularly invited to speak at national and international forums, and has testified in front of the U.S. Senate and the House of Representatives.
Previous to his current activities, he was a Principal at the Center for Strategic Space Studies (CS3) and a Senior Associate at the Center for Strategic and International Studies, nonprofit think tanks focused on educating government and industry policy makers on the implications of rapid technology change. He also was the Staff Director for the National Commission on Research and Development Investment in the Intelligence Community, responsible for reviewing global technology trends and investments while positioning the intelligence community for the future. While in government, Mr. Hartman served as the Senior Advisor to the Under Secretary of Defense for Acquisition, Technology and Logistics (USD(AT&L)) and the Deputy Assistant Secretary of Defense for Space and Intelligence (DASD(SI)).

4:30 PM – 5:00 PM

GDPR Focus

5:00 PM – 6:30 PM

Reception

Friday | November 16

8:00 AM – 9:00 AM

Breakfast

9:00 AM – 9:30 AM

The Benefits of Threatcasting

With a plethora of cyber threats, nothing is safe from persistent adversaries. Systems that were assumed for years to be secure may already be owned and awaiting commands. Organizations of all types and sizes need to think hard not only about today’s threats, but those of the future, and prepare for the consequences. Threat forecasting, also known as Threatcasting—one way to do this—is used by government and industry to do just this. Once organizations understand possible futures, they can identify gateway events that may signal them, as well as the actions they can take to possibly avoid negative futures. In this keynote, Brickey talks about how aerospace companies can benefit from threatcasting.

Dr. Jon Brickey is Senior Vice President, Cybersecurity Evangelist, for Mastercard Operations & Technology (O&T). In this role, he leads the development of cybersecurity strategy, identification of emerging capabilities, and fostering of partnerships. Jon supports Corporate Security’s mission of delivering safety and security at the speed of business.
Before joining Mastercard, Dr. Brickey served in the Army on active duty for over 26 years, holding a variety of leadership and technical roles in information systems management and cyberspace operations. In his last position, he served as the Army Cyber Institute Partner Relations Director for the National Capital Region. Commissioned through the United States Military Academy in 1991, Colonel Brickey served in Army/Joint tactical and operational positions in the United States, Europe, and Southwest Asia, including company command in V Corps Artillery, Wiesbaden, Germany. He held leadership positions in Cyber-related programs at the National Security Agency, USCYBERCOM, USNORTHCOM, ARCENT, and ARCYBER. He retired as a Colonel in July of 2017.
Dr. Brickey earned his bachelor’s degree in Political Science from the United States Military Academy at West Point and holds a master’s degree in Science in Information Technology Management from the Naval Postgraduate School. Additionally, he earned a Ph.D. in Computer Science and Information Systems from the University of Colorado Denver.

9:30 AM – 10:30 AM

Workshop A (Policy) Compliance: How to be Part of the Solution, not Part of the Problem

Working with governments on national security programs can be a lucrative business. However,
for mid-sized companies in the satellite sector, there are a maze of requirements that need to be navigated to gain compliance and able to work on such program. This workshop will aim to help those companies as they face these compliance issues. In this session, we will introduce a new model compliance framework and begin to draw out accountability maps of your products, services, users, and relationships across multiple domains and architectures.

9:30 AM – 10:30 AM

Workshop B (Operations) Training Your Staff in Cyber Threats

Criminals are finding evermore creative ways to get into systems. Recognizing the threat early or attempts to hack the system are vital in order to stop the threats. This workshop focuses on your frontline staff and how you can effectively train them to recognize a threat or potential harmful situation.

Chris Childers is the founder and CEO of National Defense Group. From secure server software and transceiver firmware for SATCOM to cyber security work with various DoD customers, Chris has been on the cutting edge of digital security for the last 15 years

9:30 AM – 10:30 AM

Workshop C (Business) Cybersecurity for Business Leaders: Making Sure your Company is Ahead of the Cyber Curve

You may not know the ins and outs of cyber threats, but you do know that any attack on your business could have catastrophic results. In this workshop, we talk about the issues specifically related to business leaders and how you must shape the company’s overall strategy to deal with cyber issues.

James L. Turgal, Jr, Executive Assistant Director (EAD), Information and Technology Branch, entered on duty in March 1996 and was assigned to the Houston Division, working Organized Crime and Drug investigations. Upon being promoted as a Supervisory Special Agent, he was assigned to FBI Headquarters, Office of General Counsel and the Counterterrorism Division, as the senior counsel for Domestic Terrorism Operations.
In 2002, Jim was assigned to the Cincinnati Division as Chief Division Counsel, Media Spokesperson, and Supervisory Special Agent. Four years later, he returned to FBI Headquarters to lead the Director’s Research Group.
He later became the Assistant Special Agent in Charge of Administration at the Washington Field office.
In 2010, Jim was selected to serve as the Special Assistant to the Deputy Director, providing counsel on various national security, criminal, and administrative issues affecting the FBI. One year later, he was designated Special Agent in Charge of the Phoenix Division, where he oversaw several high profile cases, including the shooting of U.S. Congresswoman Gabrielle Giffords. In 2012, Jim returned to FBI Headquarters, as the Deputy Assistant Director of the Human Resources Division (HRD).
In August 2013, Director Robert S. Mueller, III appointed Jim as the Assistant Director (AD) of the HRD. During this time, he served as the AD and Human Resource Officer.
On February 10, 2016, Director James B. Comey, Jr. announced the appointment of James L. Turgal, Jr., as the EAD of the Information and Technology Branch.
Jim is also a FBI certified pilot.

10:30 AM – 11:00 AM

Coffee Break

11:00 AM – 12:00 PM

Workshop A (Policy) NIST: Understanding and Implementation Decisions Around NIST

A technical discussion about the various ways hackers could target different elements of the aerospace industry and associated recommendations to improve resilience. Example topics could include: -Supply chain -Ground station security -Use of COTS products -Tracking Telemetry and Control

Andy Joined NCC Group in 2010 as Research Director. In his role as Transport Assurance Practice Director his team delivers a comprehensive suite of cyber security and assurance services to Automotive, Maritime, Rail and Aerospace sectors across the globe. Andy has over 25 years’ experience in cyber security gained from working in various Government departments and high profile roles in a range of security consulting firms.

A major cyber-attack on your company is both probable and highly damaging. However, few companies have planned for this and fewer still have acted out a cyber attack scenario. This practical scenario-based workshop puts you in charge of a company that has just been attacked as you deal with the escalating fallout on departments, operations and the press.

Lisa started her career in the maritime sector working with shipping companies to defend against the Somali pirate threat. Her work involved both physical and technical security and she developed a keen interest in intelligence gathering. Lisa then went to work for the UK Counter Terrorism Intelligence Services where she was involved in a range of overt and covert intelligence gathering operations. Whilst there she headed up research into the process of online radicalisation and social engineering. She studied the processes used by terrorist groups to manipulate individuals into doing something that would be “out of character” for them- something that is echoed in the cyber crime space. Lisa then moved into one of the UK Police Cyber Crime Units where she worked on a plethora of cases the majority of which also employed social engineering. Whilst there Lisa saw similar attack techniques being employed in a wealth of cases and often attacks were made worse by poor planning & decision making on the part of the victim organisation. Lisa decided to set up her own business with the aim of copying the tactics used by hackers to help organisations better defend themselves against the real threats. Lisa speaks around the world at conferences and after dinner speaking engagements. Red Goat Cyber Security engages in a lot of pro-bono work too for the NHS and various charities reflecting Lisa’s interest in keeping the communities we live and work in as safe as possible.

12:00 PM – 1:00 PM

Lunch Keynote

1:00 PM – 1:30 PM

Dessert Break with Exhibitors

1:30 PM – 2:30 PM

Mobility Cybersecurity: The Threat Assessed

As ships, planes, cars and other vehicles get more and more connected, there is little doubt that the threat towards them has increased exponentially. How is this critical group of end users and the satellite industry equipping themselves to deal with this emerging threat? How is the maritime industry preparing to fight cyber threats in a mobile world and what can other mobile users learn from this important vertical?

Andy Joined NCC Group in 2010 as Research Director. In his role as Transport Assurance Practice Director his team delivers a comprehensive suite of cyber security and assurance services to Automotive, Maritime, Rail and Aerospace sectors across the globe. Andy has over 25 years’ experience in cyber security gained from working in various Government departments and high profile roles in a range of security consulting firms.

Reza Rasoulian

Vice President, Global Guest Connectivity

Carnival Corporation & PLC

Reza Rasoulian is the Vice President of Global Connectivity at Carnival. His responsibility includes the leadership of global connectivity for the largest cruise company in the world. Carnival brands include AIDA, Carnival Cruise Line, Costa, Cunard, Holland America Line, Princess Cruises, P&O Cruises Australia, P&O Cruises UK, and Seabourn. Rasoulian’s responsibility includes leading the design, development, and deployment of end to end connectivity solutions, as well as innovation programs enhancing the guest, team-member, and operational connectivity experience across Carnival’s 102+ ships and 11 Million guests per year. Rasoulian brings with him over 22 years of experience in connectivity design, development, deployment, and operation with focus on Satellite connectivity systems. He previously led the implementation and launch of highly reliable mobile and high throughput satellite systems at Hughes Network Systems. Rasoulian holds a Master of Science degree in Systems Engineering from the Johns Hopkins University, and a BSIS from the University of Maryland, and is PMP certified.

Speaking Opportunities

Group Registration Inquiries (3+)

Subscribe to Via Satellite

Via Satellite is the global leader in connectivity: Premium Content, First Rate Networking and Superior Experience. Subscribe today and join the satellite communications and space technology communities by staying in-tune with the latest technology advances, mergers and acquisitions, new applications, and advancements enabled by satellite. Subscribe